You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: website/docs/components/data-connectors/mongodb.md
+26Lines changed: 26 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -265,6 +265,32 @@ datasets:
265
265
mongodb_pool_max: 10
266
266
```
267
267
268
+
### Using MongoDB Change Streams
269
+
270
+
Spice supports real-time Change Data Capture (CDC) from MongoDB using native [MongoDB Change Streams](https://www.mongodb.com/docs/manual/changeStreams/). This enables streaming inserts, updates, and deletes from your MongoDB collections directly into Spice accelerators.
271
+
272
+
To enable real-time CDC, set `refresh_mode: changes` in the dataset's configuration:
273
+
274
+
```yaml
275
+
datasets:
276
+
- from: mongodb:my_collection
277
+
name: my_collection
278
+
params:
279
+
host: my-cluster.mongodb.net
280
+
db: mydb
281
+
acceleration:
282
+
enabled: true
283
+
engine: duckdb
284
+
refresh_mode: changes
285
+
```
286
+
287
+
#### Notes
288
+
- Requires MongoDB 4.0+ and a replica set or sharded cluster.
289
+
- Ensure your MongoDB user has `changeStream` privileges.
290
+
291
+
---
292
+
293
+
268
294
## Secrets
269
295
270
296
Spice integrates with multiple secret stores to help manage sensitive data securely. For detailed information on supported secret stores, refer to the [secret stores documentation](../secret-stores). Additionally, learn how to use referenced secrets in component parameters by visiting the [using referenced secrets guide](../secret-stores#using-secrets).
Copy file name to clipboardExpand all lines: website/docs/reference/spicepod/runtime.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -215,6 +215,15 @@ The TLS section specifies the configuration for enabling Transport Layer Securit
215
215
216
216
In addition to configuring TLS via the manifest, TLS can also be configured via `spiced` command line arguments using the `--tls-enabled true` flag along with `--tls-certificate`/`--tls-certificate-file` and `--tls-key`/`--tls-key-file`.
217
217
218
+
### Certificate Hot-Reload
219
+
220
+
Spice can hot-reload TLS certificates and client CA files for runtime endpoints. Update the certificate, key, or CA file on disk, then send `SIGHUP` to the Spice process to reload without restart. Only file-based certificates/keys/CA are hot-reloaded (not inline PEM). Existing connections are not interrupted; only new connections use the updated files. If reload fails, the previous certificate remains active and a warning is logged.
221
+
222
+
**Steps:**
223
+
1. Replace the certificate/key/CA file on disk.
224
+
2. Send `SIGHUP` to the Spice process (e.g., `kill -SIGHUP <pid>`).
225
+
3. Check logs for reload confirmation or errors.
226
+
218
227
### `runtime.tls.enabled`
219
228
220
229
Enables or disables TLS for the runtime endpoints.
@@ -233,7 +242,6 @@ The TLS certificate to use for securing the runtime endpoints. The certificate c
233
242
```yaml
234
243
runtime:
235
244
tls:
236
-
...
237
245
certificate: |
238
246
-----BEGIN CERTIFICATE-----
239
247
...
@@ -254,7 +262,6 @@ The path to the TLS PEM-encoded certificate file. Only one of `certificate` or `
254
262
```yaml
255
263
runtime:
256
264
tls:
257
-
...
258
265
certificate_file: /path/to/cert.pem
259
266
```
260
267
@@ -265,10 +272,9 @@ The TLS key to use for securing the runtime endpoints. The key can also come fro
265
272
```yaml
266
273
runtime:
267
274
tls:
268
-
...
269
275
key: |
270
276
-----BEGIN PRIVATE KEY-----
271
-
...
277
+
(private key contents)
272
278
-----END PRIVATE KEY-----
273
279
```
274
280
@@ -286,7 +292,6 @@ The path to the TLS PEM-encoded key file. Only one of `key` or `key_file` must b
286
292
```yaml
287
293
runtime:
288
294
tls:
289
-
...
290
295
key_file: /path/to/key.pem
291
296
```
292
297
@@ -323,7 +328,6 @@ Path to a PEM-encoded CA bundle used to verify client certificates. The file is
323
328
```yaml
324
329
runtime:
325
330
tls:
326
-
...
327
331
client_auth_ca_file: /path/to/client-ca.pem
328
332
```
329
333
@@ -334,7 +338,6 @@ Inline PEM (or `${ secrets:... }`) form of the client CA bundle. Mutually exclus
0 commit comments